First published: Thu Jun 27 2019(Updated: )
A reflective Cross-site scripting (XSS) vulnerability in the free_time_failed.cgi CGI program in selected Zyxel ZyWall, USG, and UAG devices allows remote attackers to inject arbitrary web script or HTML via the err_msg parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel UAG2100 | <=4.18\(aaiz.1\)c0 | |
Zyxel UAG2100 | ||
Zyxel UAG4100 | <=4.18\(aatd.1\)c0 | |
Zyxel UAG4100 | ||
Zyxel uag5100 | <=4.18\(aapn.1\)c0 | |
Zyxel UAG5100 Firmware | ||
Zyxel USG 110 Firmware | <=4.30 | |
Zyxel USG 110 | ||
Zyxel USG210 Firmware | <=4.30 | |
Zyxel USG210 Firmware | ||
Zyxel USG 310 firmware | <=4.30 | |
Zyxel USG 310 | ||
Zyxel USG1100 firmware | <=4.30 | |
Zyxel USG1100 firmware | ||
Zyxel USG1900 Firmware | <=4.30 | |
Zyxel USG1900 Firmware | ||
Zyxel USG2200-VPN Firmware | <=4.30 | |
Zyxel USG2200-VPN Firmware |
https://sec-consult.com/en/blog/advisories/reflected-cross-site-scripting-in-zxel-zywall/index.html
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this XSS vulnerability is CVE-2019-12581.
CVE-2019-12581 has a severity of medium with a CVSS score of 6.1.
Selected Zyxel ZyWall, USG, and UAG devices are affected by CVE-2019-12581.
An attacker can exploit CVE-2019-12581 by injecting arbitrary web script or HTML via the err_msg parameter in the free_time_failed.cgi CGI program.
Yes, there are fixes and patches available for CVE-2019-12581. It is recommended to update to the latest firmware versions provided by Zyxel.